Question 21

You are working with a customer to create a design proposal using SRX Series devices. As part of the design, you must consider the requirements shown below:
You must ensure that every packet entering your device is independently inspected against a set of rules.
You must provide a way to protect the device from undesired access attempts.
You must ensure that you can apply a different set of rules for traffic leaving the device than are in use for traffic entering the device.
In this scenario, what do you recommend using to accomplish these requirements?
  • Question 22

    You are designing a DDoS solution for an ISP using BGP FlowSpec. You want to ensure that BGP FlowSpec does not overwhelm the ISP's edge routers.
    Which two requirements should be included in your design? (Choose two.)
  • Question 23

    You are deploying Security Director with the logging and reporting functionality for VMs that use SSDs. You expect to have approximately 20,000 events per second of logging in your network.
    In this scenario, what is the minimum number of logging and reporting devices that should be used?
  • Question 24

    Which two steps should be included in your security design process? (Choose two.)
  • Question 25

    In a data center, what are two characteristics of access tier VLAN termination on the aggregation tier? (Choose two.)